Welcome to GeekPolice!

Our Appeal to YOU: Please join and help us grow this website. We truly love technology and security and we want to share it with the world. Recognize the excitement of technology here daily:☞Security Discussion on malware, ransomware, and much more!
☞24/7 hard- and software tech support (+mobile!)
☞Virus and malware removal support
☞Tons of tutorials, guides and solutions
☞The very finest of our voluntary Support Staff
☞Much, much more absolutely FREE of any charge!

Note to non-members: Guests are able to open topics and reply to posts; however, guests are not allowed to create their own profile, unless they register (which you can do so below). By registering, you unlock many more capabilities of this site, and are able to interact with other members including making friends! Who wouldn't love a friendly tech community? Join us now!

The MalwareBytes does not recognize anything, as nothing has ever been removed with it. Apparently, this program runs under the false auspices of Google Updater and gets away. I have searched the file name in the location given and it is not there. Under running processes, it is also not listed. Please help with anything that you may know to help me get this GONE!

Only Tech Officers, Global Moderators, Administrators, and Malware Advisors are allowed to give advice on removing malware from your computer.

From this point on, please do not make any more changes to your computer; such as install/uninstall programs, use special fix tools, delete files, edit the registry, etc. - unless advised by the staff I noted above.

Please do not ask for help elsewhere (in this site or other sites). Doing so can result in system changes, which may not show up in the logs you post.

If you have already asked for help somewhere, please post the link to the topic you were helped.

We try our best to reply quickly, but for any reason we do not reply in two days, do one of two things:

Right-click on the RootkitUnhooker setup and mouse-over 7-Zip then click Extract to "RKU***"

Once that is done, enter the folder, and double-click on the setup file. Navigate through setup and finish.

Once that is done, you will see another folder that was created inside the RKU folder. Enter that folder, and double-click on the randomly named file. (It will be alpha-numeric and have an EXE extension on it.)

It will initialize itself and load the scanner. It will also install its driver. Please wait for the interface to begin.

Once inside the interface, do not fix anything. Click on the Report tab.

Next, click on the Scan button and a popup will show. Make sure all are checked, then click on OK. It will begin scanning. When it gets to the Files tab, it will ask you what drives to scan. Just select C:\ and hit OK.

It will finish in about 5 minutes or a little longer depending on how badly infected the system is, or if your security software is enabled.

When finished, it will show the report in the Report tab. Please copy all of it, and post it in your next reply. Depending on how large the log is, you may have to use two or three posts to get all the information in.